<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Action Inferences from IoT Devices: a Risk Detection Case Study Applied in Smart Home</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Abdullah Alhejaili??</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>Internet of Things (IoT) is a recent hot area in both academic and industrial interests, which has been proposed to address many application domains, including e-health, smart car, smart city, and smart home etc. While IoT paradigm allows to connect heterogeneous objects (e.g., sensors and/or devices), understanding their relationships can help to derive smart actions and useful predictions. In this research, we focus on action derivation from smart home by analysing Things relationships and their correlations. We consider re risk detection problem as a case study to evaluate di erent critical aspects of the approach, including precision, scalability, performance, and e ectiveness in terms of cost and complexity. We are currently working on building a simulation tool as a base of the study using some of the cutting-edge technologies, such as OWL ontology, semantic web services and data mining algorithms.</p>
      </abstract>
      <kwd-group>
        <kwd>Internet of Things</kwd>
        <kwd>Smart Home</kwd>
        <kwd>Home Automation System</kwd>
        <kwd>Event Recognition</kwd>
        <kwd>Risk Detection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Internet of Things (IoT) is a promising evolution in the next big wave of web and
internet technologies. Under its vision, everyday objects (such as people, services,
devices, and sensors) need to be interconnected and smartly able to communicate
in a constructive and sensible ways to provide perfect services [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Concerning
Smart Home (SH) as one of the hottest IoT application domains [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], di erent
distributed devices inside and outside home (e.g., light bulb, radiator, cooker,
and tab etc.) should be network-enabled (using, e.g., ZigBee or Wi-Fi) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The
connection of these devices as well as their relationships can be exploited to
support many desire and intelligent services, including energy saving, security
and safety, risk and re protection.
      </p>
      <p>
        With respect to the latter (i.e., re protection service), the UK-government
reports [
        <xref ref-type="bibr" rid="ref1 ref2">2,1</xref>
        ] that the accuracy of the existing solutions for detecting re
incidences is not good enough. They discover that there is approximately 40% of
false-alarm incidents, attended by re and rescue services. In addition, their
report mentions several key reasons behind re-alarm failure. One of these reasons
is that the detector has a limited range to cover, resulting in many true-negative
cases (e.g., when a real re incident occur and the smoke did not reach the
detectors). These limitations have motivated us to provide an IoT based solution
that can predict for some speci c and potential re incidences in advance. The
idea is to analyse the behaviour of SH entities, focusing on their relationships,
to infer essential actions.
      </p>
      <p>In this research, we are generally interested in detecting unexpected actions
in smart home by analysing Things relationships and their correlations. We seek
to investigate the derivation techniques of smart actions in principle, and then
practically evaluate their precision, scalability, performance, and e ectiveness
in terms of cost and complexity. To this end, we apply our research on SH
domain for detecting re incidences as a motivating case study. Currently, we
are investigating some of the cutting-edge technologies to adopt, such as OWL
ontology, semantic web services and statistical data mining algorithms.</p>
      <p>The remainder of this paper is organised as follows. section 2 presents brie y
work related to event based detection techniques. Sections 3 and 4 respectively
present our research questions and proposal, focusing on SH application domain.
Then, section 5 discusses the current status of our work and the plan for the
next activities. Finally, section 6 concludes the paper.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        Existing event-detection approaches fall roughly into one of the two categories:
ontology-based [
        <xref ref-type="bibr" rid="ref11 ref6">11,6</xref>
        ] and sensor-based [
        <xref ref-type="bibr" rid="ref3 ref9">9,3</xref>
        ] approaches. For example, [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] propose
an ontology-based and a rule-based reasoning (so-called SWRL) approaches for
risk detection and/or service decision support in SH management. They
developed a prototype tool that monitors all SH environments, including speci c
sensor readings that describers neighbourhood behaviours, for providing
realtime suggestions. Their approach is extendable, i.e., exible for de ning a new
or omitting an existing SH's entity from the system with no time restriction.
This seems a good feature in general, but applying it frequently could a ect
detection's accuracy. In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], they suggest a SH with the purpose of promoting
safe environment methods, relaying entirely on wireless sensor networks. One of
the notable features, in their protocol, is the possibility of converting old home
to be smart using sensing techniques.
      </p>
      <p>
        In SH, di erent detection activities are typically implemented, each to reach a
speci c goal. For instance, a well-SH system should provide healthcare services
by monitoring resident's movement or body condition. Whiles, other features
such as safety-service would require monitoring di erent entities in a di erent
mechanism such as observing daily habits (e.g., cooking) of home residents. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]
classify broadly user activities for event-detection into four types:
{ Single user sequential activities, where a single user performs only one
activity at a time.
{ Multi-user sequential and simultaneous activities, where more than one user
perform the same activity, e.g. drinking tea together.
{ Multi-user collaborative activities, where multiple users perform di erent
activities cooperatively to achieve the same gaol, e.g. more than one user are
cooking together.
{ Multi-user concurrent activities, where multiple users perform di erent
activities independently aiming to di erent gaols, e.g. one user is watching TV
while the other is cooking.
      </p>
      <p>
        To our knowledge, there are two closely relevant proposals to ours that
consider explicitly re detection problems [
        <xref ref-type="bibr" rid="ref10 ref7">10,7</xref>
        ]. These proposed solutions we aware
of are principally re alarm or video based system. They are mostly devoted to
address di erent re accidents based on their real occurrence, but not factually
beforehand. The fundamental techniques behind the current solutions are
ranging from conventional devices, relying on, e.g., smoke or temperature
measurements, to the high smart image processing solutions, such as ickering colours or
video analysis system. Despite this, the ability of maximising home protections
based on in-advance risk detection has not been addressed yet.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Research Hypothesis and Questions</title>
      <p>SH supports integrating di erent devices and systems to be managed by a single
control unit. It allows automating some actions without setting a timer or making
an explicit request. Rather than monitoring or controlling home environment,
SH needs to be more intelligent for generating smart actions, such as
detecting unobvious re risk cases or notifying e ectively for future expectations in a
dynamic way. Our main hypothesis is that \following the IoT paradigm by
using the concepts and innovative technologies (such as OWL ontologies, semantic
web services, statistical machine learning algorithms) would make home
infrastructure more interactive, smart and aware in providing better/robust services".
To shed lights on our objectives behind this hypothesis, we list two conceptual
questions that may indicate the contributions we seek to make as follows:
{ What kinds of smart buildings an action prediction approach like we propose
is useful for, and on which kinds of Thing's relationships this approach is more
e ective?
{ What are the technical pros and cons of using IoT paradigm, including,
complexity, scalability, performances, and usability?</p>
      <p>Generally, these questions can be addressed by building up SH's simulation
that allows to compare di erent risk scenarios with the ability of identifying the
key pros and cons of the approach. Having such simulation would also help to
explain whether following the IoT paradigm for smart home risk detection is
bene cial as compared to the other alternative approaches.</p>
    </sec>
    <sec id="sec-4">
      <title>Proposed Approach and Preliminary Work</title>
      <p>To address the research questions of our research, we intend to examine two
well-known techniques: (1) Ontology based structure to represent home model
in a logical way, allowing to design entities, sensors, and their complex
relationships. And (2) Machine learning to maximise home services by enabling some
entities controlling automatically another entity without explicitly de ning
prerequest for every action. These two methods are to ful l the main requirements of
building a framework architecture for our research. This architecture would rely
principally on three main components: a work ow simulation to simulate home
entities in terms of generating input/output reading, controlled by a generic
interface; a database schema designed by OWL-Ontology for storing all data; and
an adapter to integrate our tool with a machine learning tool for encoding the
recoded data as well as collecting inferred actions.</p>
      <p>Progress so far. Fig. 1 describes brie y a suggested model for our SH. It
consists of several connected entities to the local network, and each entity has
a unique id such that its status (e.g., on/o ) can be checked. Sensor S3, as an
example, is used to detect the presence of people inside the kitchen. Here, if the
Cooker is o and nobody insides the kitchen, no risk can be detected unless
something unusual occur, which can be detected by smoke or heat alarm. Even
though it is highly recommended for people to stay in the kitchen while cooking,
sometime people may forget to switch o their cooker before they leave. In
response to this recommendation, if SH is capable for analysing the relationships
between, e.g., Cooker and S3, optimising re risk detections in terms of alerting
as early as possible for any expected risk can be achieved. Consequently,
householders can take, in advance, further actions, e.g., going back to the kitchen or
switching o the Cooker remotely, etc.</p>
      <p>We have tried out to check conceptually the validity of our proposal, using
the extracted dataset, see Fig. 2. In principle, this dataset describes the learning
inputs such that the classes (i.e., de ned in Fig. 1) appear as columns, and
each instance, representing reading data, appears as a row. In this preliminary
experiment, we assume that the 28 instances (see, Fig. 2) are already extracted
manually by de ning the behaviours of the entities, i.e., modelled in Fig. 1. For
example, (rows from 1 to 21) describe some obvious cases that no risk event
needs to be generated. They cover the cases when the Cooker is either o (rows
1 - 17), or in-use as normal by someone in the kitchen, indicated by S3 (rows
18 - 21). The rest of the rows cover some expected risk cases, including the
absence of householders in the kitchen while the Cooker is ON (rows 22 - 27),
or somebody already in but the utilisation of the Cooker exceeds the normal
average time (row 28). The latter can be a target to fainting cases, especially for
elderly people, in which it increases the level of their protection. Nevertheless,
we intend to develop a home simulation system to generate interactively many
instances for evaluating a variety of di erent scenarios. The bottom part of Fig. 2
illustrates the result obtained by RandomTree algorithm, graphically visualised
as a decision tree of 7 nodes. This decision tree allows to determine whether a
risk event must be triggered based on the current real-time reading data.</p>
      <p>We have conducted another simple experiment on the same dataset (see
Fig. 2), applied by Apriori algorithm, to illustrate a di erent useful type of
learning output. Listing 1.1 describes the result obtained, which represents
association rules between some entities. Such results can help in understating many
or probably all risk cases, but more importantly, it can enhance the learning
decision by avoiding false-positive actions. For example, rule (Cooker=False ==&gt;
Action=no) states explicitly that no action is required if the Cooker is o .
Currently, this action could not be inferred by our dataset as no instance representing
it. However, the association rules can be used as a validation (e.g., testing the
accuracy of the inferred decision tree) by ltering out any false-positive action,
generated imprecisely with the condition (e.g., Cooker==False).</p>
      <p>Listing 1.1: Learning output which describe association rules between entities
1 . Cooker=F a l s e =&gt; S e n s o r 3=F a l s e . . .
2 . Ahmed smartphone=F a l s e =&gt; S e n s o r 3=F a l s e . . .
3 . d u r a t i o n=none =&gt; S e n s o r 3=F a l s e . . .
4 . d u r a t i o n=none =&gt; Cooker=F a l s e . . .
5 . Cooker=F a l s e =&gt; d u r a t i o n=none . . .
6 . Cooker=F a l s e =&gt; A c t i o n=no . . .
7 . d u r a t i o n=none =&gt; A c t i o n=no . . .
8 . Cooker=F a l s e d u r a t i o n=none =&gt; S e n s o r 3=F a l s e
9 . S e n s o r 3=F a l s e d u r a t i o n=none =&gt; Cooker=F a l s e
1 0 . S e n s o r 3=F a l s e Cooker=F a l s e =&gt; d u r a t i o n=none
. . .
. . .
. . .
5</p>
    </sec>
    <sec id="sec-5">
      <title>Research Plan and Current State</title>
      <p>VII
6</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>In consonance with computable existing re-protection solutions, our IoT
approach will be conceptually modelled to be complementary to the recent
addressable risk detection devices for validation and evaluation only. Therefore, to
generalise the main contributions of this approach, we will investigate empirically
how our derivation technique of unexpected/smart actions can be customised to
suit di erent IoT applications and speci cations.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <article-title>Fire statistics data tables - statistical data sets - GOV</article-title>
          .UK. https://www. gov.uk/government/statistical
          <article-title>-data-sets/fire-statistics-data-tables</article-title>
          .,
          <source>accessed: 2017-05-20</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Gaught</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gallucci</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smalldridge</surname>
          </string-name>
          , G.: Fire statistics england,
          <year>2014</year>
          /15 (published on
          <year>2016</year>
          ). https://www.gov.uk/government/uploads/system/uploads/ attachment_data/file/532364/fire-statistics-england-
          <volume>1415</volume>
          -hosb0816. pdf.,
          <source>accessed: 2017-05-20</source>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Ghayvat</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , Liu,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Mukhopadhyay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.C.</given-names>
            ,
            <surname>Gui</surname>
          </string-name>
          ,
          <string-name>
            <surname>X.</surname>
          </string-name>
          :
          <article-title>Wellness sensor networks: A proposal and implementation for smart home for assisted living</article-title>
          .
          <source>IEEE Sensors Journal</source>
          <volume>15</volume>
          (
          <issue>12</issue>
          ),
          <volume>7341</volume>
          {7348 (Dec
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Gill</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yao</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>X.:</given-names>
          </string-name>
          <article-title>A zigbee-based home automation system</article-title>
          .
          <source>IEEE Trans. Consumer Electronics</source>
          <volume>55</volume>
          (
          <issue>2</issue>
          ),
          <volume>422</volume>
          {
          <fpage>430</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Gu</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tao</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lu</surname>
          </string-name>
          , J.:
          <article-title>Mining emerging patterns for recognizing activities of multiple users in pervasive computing</article-title>
          .
          <source>In: 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services</source>
          ,
          <string-name>
            <surname>MOBIQUITOUS</surname>
          </string-name>
          <year>2009</year>
          , Toronto, Canada,
          <source>July 13-16</source>
          ,
          <year>2009</year>
          . pp.
          <volume>1</volume>
          {
          <issue>10</issue>
          (
          <year>2009</year>
          ), https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6818
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. H, X.,
          <string-name>
            <surname>Y</surname>
          </string-name>
          , J.,
          <string-name>
            <surname>Z</surname>
          </string-name>
          , X., C, S.:
          <article-title>A semantic approach with decision support for safety service in smart home management</article-title>
          .
          <source>Sensors</source>
          <volume>16</volume>
          (
          <issue>8</issue>
          ),
          <volume>1224</volume>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. K, Y.,
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          , H.:
          <article-title>RGB color model based the re detection algorithm in video sequences on wireless sensor network</article-title>
          .
          <source>IJDSN</source>
          <volume>10</volume>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Pavithra</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Balakrishnan</surname>
          </string-name>
          , R.:
          <article-title>Iot based monitoring and control system for home automation</article-title>
          .
          <source>In: 2015 Global Conference on Communication Technologies (GCCT)</source>
          . pp.
          <volume>169</volume>
          {
          <issue>173</issue>
          (April
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Suthokumar</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tharmakulasingam</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Johnnirajh</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subendran</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dias</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Smart building - towards the insight remotely</article-title>
          .
          <source>In: 2016 International Conference on Internet of Things and Applications (IOTA)</source>
          . pp.
          <volume>395</volume>
          {
          <issue>400</issue>
          (Jan
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. V, S.,
          <string-name>
            <given-names>L</given-names>
            , P.,
            <surname>Van de</surname>
          </string-name>
          <string-name>
            <surname>W</surname>
          </string-name>
          , R., M, B., S,
          <string-name>
            <surname>B.</surname>
          </string-name>
          :
          <article-title>State of the art in vision-based re and smoke detection</article-title>
          .
          <source>In: International Conference on Automatic Fire Detection, 14th, Proceedings</source>
          . vol.
          <volume>2</volume>
          , pp.
          <volume>285</volume>
          {
          <fpage>292</fpage>
          . University of Duisburg-Essen.
          <article-title>Department of Communication Systems (</article-title>
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. W, K.,
          <string-name>
            <surname>I</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>B</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>S</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          ,
          <string-name>
            <surname>L</surname>
          </string-name>
          , A., T, Y.:
          <article-title>Activity recognition using context-aware infrastructure ontology in smart home domain</article-title>
          .
          <source>In: 7th International Conference on Knowledge, Information and Creativity Support Systems</source>
          , KICSS, Melbourne, Australia. pp.
          <volume>50</volume>
          {
          <issue>57</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Whitmore</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agarwal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>L.D.:</given-names>
          </string-name>
          <article-title>The internet of things - A survey of topics and trends</article-title>
          .
          <source>Information Systems Frontiers</source>
          <volume>17</volume>
          (
          <issue>2</issue>
          ),
          <volume>261</volume>
          {
          <fpage>274</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>